咨询与建议

限定检索结果

文献类型

  • 28,016 篇 会议
  • 11,437 篇 期刊文献
  • 352 册 图书

馆藏范围

  • 39,805 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 24,385 篇 工学
    • 19,152 篇 计算机科学与技术...
    • 15,962 篇 软件工程
    • 5,004 篇 信息与通信工程
    • 3,049 篇 控制科学与工程
    • 2,573 篇 生物工程
    • 2,104 篇 电气工程
    • 1,624 篇 机械工程
    • 1,592 篇 生物医学工程(可授...
    • 1,572 篇 电子科学与技术(可...
    • 1,285 篇 光学工程
    • 891 篇 安全科学与工程
    • 888 篇 仪器科学与技术
    • 849 篇 化学工程与技术
    • 789 篇 动力工程及工程热...
    • 688 篇 交通运输工程
    • 685 篇 建筑学
  • 10,942 篇 理学
    • 6,371 篇 数学
    • 2,816 篇 生物学
    • 2,143 篇 物理学
    • 1,836 篇 统计学(可授理学、...
    • 1,342 篇 系统科学
    • 853 篇 化学
  • 7,271 篇 管理学
    • 4,382 篇 管理科学与工程(可...
    • 3,220 篇 图书情报与档案管...
    • 2,002 篇 工商管理
  • 1,398 篇 医学
    • 1,218 篇 临床医学
    • 1,108 篇 基础医学(可授医学...
    • 701 篇 药学(可授医学、理...
  • 1,117 篇 法学
    • 880 篇 社会学
  • 701 篇 经济学
    • 698 篇 应用经济学
  • 685 篇 教育学
  • 381 篇 农学
  • 149 篇 文学
  • 104 篇 军事学
  • 75 篇 艺术学
  • 15 篇 哲学
  • 5 篇 历史学

主题

  • 1,808 篇 software enginee...
  • 1,651 篇 computer science
  • 863 篇 computational mo...
  • 840 篇 feature extracti...
  • 790 篇 training
  • 693 篇 software
  • 668 篇 semantics
  • 604 篇 deep learning
  • 582 篇 accuracy
  • 550 篇 machine learning
  • 543 篇 data mining
  • 510 篇 application soft...
  • 425 篇 computer archite...
  • 388 篇 predictive model...
  • 383 篇 internet of thin...
  • 373 篇 software systems
  • 371 篇 testing
  • 352 篇 optimization
  • 351 篇 data models
  • 332 篇 support vector m...

机构

  • 1,216 篇 college of compu...
  • 353 篇 school of comput...
  • 299 篇 state key labora...
  • 221 篇 school of comput...
  • 196 篇 department of co...
  • 194 篇 school of comput...
  • 160 篇 school of softwa...
  • 156 篇 college of compu...
  • 146 篇 state key labora...
  • 142 篇 school of inform...
  • 137 篇 school of electr...
  • 134 篇 school of comput...
  • 127 篇 national enginee...
  • 127 篇 school of comput...
  • 125 篇 school of softwa...
  • 120 篇 school of comput...
  • 119 篇 department of co...
  • 116 篇 department of co...
  • 105 篇 school of softwa...
  • 96 篇 school of big da...

作者

  • 70 篇 ruimin hu
  • 58 篇 liu yang
  • 54 篇 chen zhong
  • 54 篇 baowen xu
  • 48 篇 hu ruimin
  • 46 篇 zhang lei
  • 45 篇 wang ping
  • 44 篇 man ka lok
  • 44 篇 stuckey peter j.
  • 43 篇 zhou jie
  • 43 篇 wang lei
  • 39 篇 zhen ji
  • 39 篇 wang hui
  • 36 篇 laizhong cui
  • 35 篇 sun xingming
  • 35 篇 jun zhang
  • 34 篇 qusay h. mahmoud
  • 33 篇 niyato dusit
  • 33 篇 shen linlin
  • 31 篇 kaishun wu

语言

  • 38,310 篇 英文
  • 1,005 篇 其他
  • 500 篇 中文
  • 13 篇 德文
  • 8 篇 日文
  • 8 篇 朝鲜文
  • 6 篇 土耳其文
  • 5 篇 法文
  • 2 篇 西班牙文
  • 2 篇 俄文
  • 1 篇 意大利文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer and Software Engineering"
39805 条 记 录,以下是4931-4940 订阅
排序:
Efficient video cutout based on adaptive multilevel banded method
收藏 引用
Science China(Information Sciences) 2012年 第5期55卷 1082-1092页
作者: CHEN MinGang 1,SUI BoCong 1,GAO Yan 2 & MA LiZhuang 1 1 Department of computer Science and engineering,Shanghai Jiao Tong University,Shanghai 200240,China 2 software engineering Institute,East China Normal University,Shanghai 200062,China 1. Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 China2. Software Engineering Institute East China Normal University Shanghai 200062 China
Although many efficient image cutout approaches have been proposed,it is still a challenge to cut out foreground objects from a video clip because of the costs of time and memory consumption and the difficulty in main... 详细信息
来源: 评论
computer defense using artificial intelligence
Computer defense using artificial intelligence
收藏 引用
2007 Business and Industry Symposium, BIS 2007
作者: Britt, Winard Gopalaswamy, Sundeep Hamilton, John .A. Dozier, Gerry V. Chang, Kai H. Department of Computer Science and Software Engineering Auburn University AuburnAL36849 United States
As library-based techniques of virus and intrusion detection prove insufficient to be means of protection for computer systems and networks, alternate methods must be incorporated into computer defense. This paper sur... 详细信息
来源: 评论
A preliminary MML linear classifier using principal components for multiple classes
收藏 引用
18th Australian Joint Conference on Artificial Intelligence, AI 2005: Advances in Artificial Intelligence
作者: Kornienko, Lara Albrecht, David W. Dowe, David L. School of Computer Science and Software Engineering Monash University Clayton Vic. 3800 Australia
In this paper we improve on the supervised classification method developed in Kornienko et al. (2002) by the introduction of Principal Components Analysis to the inference process. We also extend the classifier from d... 详细信息
来源: 评论
Classifying user forum participants: Separating the gurus from the hacks, and other tales of the internet  8
Classifying user forum participants: Separating the gurus fr...
收藏 引用
8th Australasian Language Technology Association Workshop, ALTA 2010
作者: Lui, Marco Baldwin, Timothy NICTA VRL Department of Computer Science and Software Engineering University of Melbourne VIC3010 Australia
This paper introduces a novel user classification task in the context of web user forums. We present a definition of four basic user characteristics and an annotated dataset. We outline a series of approaches for pred...
来源: 评论
Reverse engineering of dependency graphs via dynamic analysis  11
Reverse engineering of dependency graphs via dynamic analysi...
收藏 引用
5th European Conference on software Architecture, ECSA 2011 - Workshop on Traceability, Dependencies and software Architecture, TDSA 2011, 1st International Workshop on software Architecture Variability, SAVA 2011
作者: Hasselbring, Wilhelm University of Kiel Institute of Computer Science Software Engineering Group D-24118 Kiel Germany
Reverse engineering of software systems often employs static analysis of a program's source code. In this invited talk, I will present our approach to reverse engineering of software systems via analyzing monitori... 详细信息
来源: 评论
Optimal decision-making under uncertainties
Optimal decision-making under uncertainties
收藏 引用
2012 9th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2012
作者: Tadjouddine, Emmanuel M. Wu, Xiaoyi Department of Computer Science and Software Engineering Xi'An Jiatong-Liverpool University SIP Suzhou China
We consider stochastic games wherein players are striving to make optimal decisions but their decisions are subject to mistakes or random shocks. We assume that the players make decisions in the direction of higher pa... 详细信息
来源: 评论
Preventing feature interactions by constraints
Preventing feature interactions by constraints
收藏 引用
30th Annual International computer software and Applications Conference, COMPSAC 2006
作者: Jihong, Zuo Qianxiang, Wang Hong, Mei Institute of Software School of Electronics Engineering and Computer Science Peking University Beijing 100871 China
As software systems evolve by adding new extensions some unexpected conflicts may occur, which is known as the Feature Interaction Problem (FIP). FIP is a threat to the dependability of software systems as it can brea... 详细信息
来源: 评论
Tissue specific prediction of N^(6)-methyladenine sites based on an ensemble of multi-input hybrid neural network
收藏 引用
BIOCELL 2022年 第4期46卷 1105-1121页
作者: CANGZHI JIA DONG JIN XIN WANG QI ZHAO School of Science Dalian Maritime UniversityDalian116026China School of Computer Science and Software Engineering University of Science and Technology LiaoningAnshan114051China
N^(6)-Methyladenine is a dynamic and reversible post translational modification,which plays an essential role in various biological *** of the current inability to identify m6A-containing mRNAs,computational approache... 详细信息
来源: 评论
Subjective evaluation of sound quality for mobile spatial digital audio
Subjective evaluation of sound quality for mobile spatial di...
收藏 引用
International Conference on computer Science and software engineering, CSSE 2008
作者: Cong, Zhang RuiMin, Hu School of Computer National Engineering Research Center for Multimedia Software Wuhan University Wuhan China National Engineering Research Center for Multimedia Software Wuhan University Wuhan China
In the past decades, technical developments have enabled the delivery of sophisticated mobile spatial audio signals to consumers, over links that range very widely in quality, requiring decisions to be made about the ... 详细信息
来源: 评论
Tidal-Tree-Mem: Toward Read-Intensive Key-Value Stores With Tidal Structure Based on LSM-Tree
Tidal-Tree-Mem: Toward Read-Intensive Key-Value Stores With ...
收藏 引用
作者: Ma, Chenlin Yang, Hao Wu, Shangyu Wang, Yi Mao, Rui Shenzhen University College of Computer Science and Software Engineering Shenzhen518060 China City University of Hong Kong Department of Computer Science Hong Kong Shenzhen University College of Computer Science and Software Engineering The Shenzhen Institute of Computing Sciences Shenzhen518060 China
The log-structured merge-tree (LSM-tree)-based key-value store has been widely adopted by many large-scale data storage applications for its excellent write performance. However, such write performance gains mainly co... 详细信息
来源: 评论